GitHub user ivmaykov opened a pull request:

    https://github.com/apache/zookeeper/pull/710

    ZOOKEEPER-3195: TLS - disable client-initiated renegotiation

    Summary: client-initiated renegotiation is insecure and is vulnerable to 
MITM attacks.
    Unfortunately, the feature is enabled in Java by default. This disables it.
    See https://bugs.openjdk.java.net/browse/JDK-7188658 and
    
https://www.oracle.com/technetwork/java/javase/documentation/tlsreadme-141115.html
    
    Test Plan: manually tested by running a secure ZK server and probing the 
listening port
    with python's sslyze tool (using `sslyze --reneg ...`). Tested on Java 8, 
9, 10, and 11.

You can merge this pull request into a Git repository by running:

    $ git pull https://github.com/ivmaykov/zookeeper ZOOKEEPER-3195

Alternatively you can review and apply these changes as the patch at:

    https://github.com/apache/zookeeper/pull/710.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

    This closes #710
    
----
commit 027d7d24912dc7a00d798a77196f83be06229755
Author: Ilya Maykov <ilyam@...>
Date:   2018-11-20T23:30:23Z

    ZOOKEEPER-3195: TLS - disable client-initiated renegotiation
    
    Summary: client-initiated renegotiation is insecure and is vulnerable to 
MITM attacks.
    Unfortunately, the feature is enabled in Java by default. This disables it.
    See https://bugs.openjdk.java.net/browse/JDK-7188658 and
    
https://www.oracle.com/technetwork/java/javase/documentation/tlsreadme-141115.html
    
    Test Plan: manually tested by running a secure ZK server and probing the 
listening port
    with python's sslyze tool (using `sslyze --reneg ...`). Tested on Java 8, 
9, 10, and 11.

----


---

Reply via email to